Search Results

There are 5299 results for: content related to: Programmatically defining the software footprint of sensor networks using the Android platform

  1. Cross-layer resource control and scheduling for improving interactivity in Android

    Software: Practice and Experience

    Volume 45, Issue 11, November 2015, Pages: 1549–1570, Sungju Huh, Jonghun Yoo and Seongsoo Hong

    Version of Record online : 11 AUG 2014, DOI: 10.1002/spe.2285

  2. DroidScreening: a practical framework for real-world Android malware analysis

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1435–1449, Junfeng Yu, Qingfeng Huang and CheeHoo Yian

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1430

  3. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

    Security and Communication Networks

    Volume 9, Issue 5, 25 March 2016, Pages: 389–419, Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel Hein, Stefan Kraxberger and Clemens Orthacker

    Version of Record online : 18 JAN 2013, DOI: 10.1002/sec.675

  4. AndroGenerator: An automated and configurable android app network traffic generation system

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4273–4288, Xin Su, Dafang Zhang, Wenjia Li and Xiaofei Wang

    Version of Record online : 15 SEP 2015, DOI: 10.1002/sec.1341

  5. An evaluation framework for cross-platform mobile application development tools

    Software: Practice and Experience

    Volume 45, Issue 10, October 2015, Pages: 1331–1357, Sunny Dhillon and Qusay H. Mahmoud

    Version of Record online : 27 AUG 2014, DOI: 10.1002/spe.2286

  6. TSSDroid: realization of an efficient and usable TSS API for the Android software stack

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1553–1576, Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa and Toqeer Ali Syed

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1448

  7. Is the data on your wearable device secure? An Android Wear smartwatch case study

    Software: Practice and Experience

    Quang Do, Ben Martini and Kim-Kwang Raymond Choo

    Version of Record online : 18 MAY 2016, DOI: 10.1002/spe.2414

  8. PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2338–2349, Jianliang Wu, Tingting Cui, Tao Ban, Shanqing Guo and Lizhen Cui

    Version of Record online : 30 JAN 2015, DOI: 10.1002/sec.1179

  9. Semantically rich application-centric security in Android

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 658–673, Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel

    Version of Record online : 23 AUG 2011, DOI: 10.1002/sec.360

  10. An effective behavior-based Android malware detection system

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2079–2089, Shihong Zou, Jing Zhang and Xiaodong Lin

    Version of Record online : 21 NOV 2014, DOI: 10.1002/sec.1155

  11. Realization of a user-centric, privacy preserving permission framework for Android

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 368–382, Mohammad Nauman, Sohail Khan, Abu Talib Othman and Shahrulniza Musa

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.986

  12. Taming transitive permission attack via bytecode rewriting on Android application

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2100–2114, Daibin Wang, Hai Jin, Deqing Zou, Peng Xu, Tianqing Zhu and Gang Chen

    Version of Record online : 22 FEB 2016, DOI: 10.1002/sec.1466

  13. Android and gynoid fat percentages and serum lipid levels in United States adults

    Clinical Endocrinology

    Volume 82, Issue 3, March 2015, Pages: 377–387, Kyoung-Bok Min and Jin-Young Min

    Version of Record online : 28 JUN 2014, DOI: 10.1111/cen.12505

  14. Context data distribution with quality guarantees for Android-based mobile systems

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 450–460, Antonio Corradi, Mario Fanelli, Luca Foschini and Marcello Cinque

    Version of Record online : 27 DEC 2012, DOI: 10.1002/sec.633

  15. Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation

    Software: Practice and Experience

    Yang Liu and Andrew Simpson

    Version of Record online : 21 APR 2016, DOI: 10.1002/spe.2403

  16. Smart malware detection on Android

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4254–4272, Laura Gheorghe, Bogdan Marin, Gary Gibson, Lucian Mogosanu, Razvan Deaconescu, Valentin-Gabriel Voiculescu and Mihai Carabas

    Version of Record online : 1 SEP 2015, DOI: 10.1002/sec.1340

  17. Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2813–2825, Zahid Anwar and Waqas Ahmad Khan

    Version of Record online : 9 FEB 2015, DOI: 10.1002/sec.1205

  18. Frameworks compiled from declarations: a language-independent approach

    Software: Practice and Experience

    Paul van der Walt, Charles Consel and Emilie Balland

    Version of Record online : 3 JUN 2016, DOI: 10.1002/spe.2417

  19. Papilio: Visualizing Android Application Permissions

    Computer Graphics Forum

    Volume 33, Issue 3, June 2014, Pages: 391–400, M. Hosseinkhani Loorak, P.W.L. Fong and S. Carpendale

    Version of Record online : 12 JUL 2014, DOI: 10.1111/cgf.12395

  20. Improving scientific application execution on android mobile devices via code refactorings

    Software: Practice and Experience

    Ana Rodriguez, Cristian Mateos and Alejandro Zunino

    Version of Record online : 22 JUN 2016, DOI: 10.1002/spe.2419